Sciweavers

14824 search results - page 2693 / 2965
» Security - Introduction
Sort
View
SEC
2008
15 years 4 months ago
Software Licence Protection and Management for Organisations
Abstract Most organisations have recently converted their physical assets into digital forms. This underlines the needs to have different types of software products to manage such ...
Muntaha Alawneh, Imad M. Abbadi
SERVICES
2008
85views more  SERVICES 2008»
15 years 4 months ago
Early Aspects for Non-Functional Properties in Service Oriented Business Processes
In Service Oriented Architecture, each application is often designed with a set of reusable services and a business process. In order to retain the reusability of services, it is ...
Hiroshi Wada, Junichi Suzuki, Katsuya Oba
SDM
2007
SIAM
130views Data Mining» more  SDM 2007»
15 years 4 months ago
Towards Attack-Resilient Geometric Data Perturbation
Data perturbation is a popular technique for privacypreserving data mining. The major challenge of data perturbation is balancing privacy protection and data quality, which are no...
Keke Chen, Gordon Sun, Ling Liu
SE
2007
15 years 4 months ago
Isolating cause-effect chains in computer systems
: One of the major tasks in maintaining software systems is understanding how specific effects came to be. This is especially true for effects that cause major harm, and especiall...
Stephan Neuhaus, Andreas Zeller
WICSA
2008
15 years 4 months ago
uDesign: End-User Design Applied to Monitoring and Control Applications for Smart Spaces
This paper introduces an architectural style for enabling end-users to quickly design and deploy software systems in domains characterized by highly personalized and dynamic requi...
João Pedro Sousa, Bradley R. Schmerl, Vahe ...
« Prev « First page 2693 / 2965 Last » Next »